Cloudtopolis: Break Hashes directly from the cloud

Cloudtopolis is one which helps us crack multiple hashes on the Google Cloud Shell platform, quickly and without any checks.

The program is .

 

Conditions

A Google Account

Installation

The installation of Cloudtopolis takes place in two phases:

Phase 1

Get in Google Cloud Shell from the link below:

https://ssh.cloud.google.com/cloudshell/editor?hl=es&fromcloudshell=true&shellonly=true

Then run the following commands in a terminal:

wget https://raw.githubusercontent.com/JoelGMSec/Cloudtopolis/master/Cloudtopolis.sh chmod + x Cloudtopolis.sh ./Cloudtopolis.sh

Phase 2

Access Google Colaboratory via the following link:

https://colab.research.google.com/github/JoelGMSec/Cloudtopolis/blob/master/Cloudtopolis.ipynb

It is necessary to fill in the fields in the “Requiriments” section with the that you put in Google Cloud Shell and Hashtopolis.

You can also access Hashtopolis directly from the following url:

https://ssh.cloud.google.com/devshell/proxy?authuser=0&port=8000&environment_id=default

Or via an SSH , following the instructions that appear after running the first script.

Use

Once the installation is complete, more factors can be added, repeating phase 2 as many times as you want.

For this, it is necessary to use 1 Google Account for each execution of Colaboratory. It is not necessary to repeat phase 1 each time. You can also use other Google accounts if you have one or your friends' accounts.

Application snapshots

 

You will find a detailed guide for installing and using the program here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).